Skip to main content

CVE-2025-9712: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Endpoint Manager

High
VulnerabilityCVE-2025-9712cvecve-2025-9712cwe-434
Published: Tue Sep 09 2025 (09/09/2025, 15:09:05 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Insufficient filename validation in Ivanti Endpoint Manager before 2024 SU3 SR1 and 2022 SU8 SR2 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.

AI-Powered Analysis

AILast updated: 09/09/2025, 15:19:40 UTC

Technical Analysis

CVE-2025-9712 is a critical security vulnerability identified in Ivanti Endpoint Manager, specifically related to CWE-434: Unrestricted Upload of File with Dangerous Type. The vulnerability arises due to insufficient filename validation in versions of Ivanti Endpoint Manager prior to the 2024 SU3 Security Update 1 and 2022 SU8 Security Update 2. This flaw allows a remote, unauthenticated attacker to upload files with dangerous types, potentially leading to remote code execution (RCE) on the affected system. The attack vector requires user interaction, which typically means the victim must perform some action such as clicking a link or opening a file. The CVSS v3.1 base score of 8.8 reflects a high severity rating, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction needed (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation could lead to complete system compromise, data theft, or disruption of services. The vulnerability is present because the application does not properly validate or restrict the types of files that can be uploaded, allowing attackers to upload malicious payloads that can be executed remotely. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of the vulnerability and the widespread use of Ivanti Endpoint Manager in enterprise environments. The lack of patch links suggests that organizations must verify and apply the specified security updates (2024 SU3 Security Update 1 and 2022 SU8 Security Update 2) to remediate this issue.

Potential Impact

For European organizations, the impact of CVE-2025-9712 could be severe. Ivanti Endpoint Manager is widely used in enterprise IT environments for endpoint management, patching, and security compliance. A successful exploitation could allow attackers to execute arbitrary code remotely, leading to unauthorized access, data breaches, disruption of critical business operations, and potential lateral movement within corporate networks. This is particularly concerning for sectors with high regulatory requirements such as finance, healthcare, and government agencies in Europe, where data protection laws like GDPR impose strict obligations on data security and breach notification. The requirement for user interaction slightly reduces the risk but does not eliminate it, as social engineering or phishing campaigns could facilitate exploitation. Additionally, the high impact on confidentiality, integrity, and availability means that sensitive personal data, intellectual property, and operational continuity could be compromised, resulting in financial losses, reputational damage, and legal consequences.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediate verification of Ivanti Endpoint Manager versions in use and prompt application of the 2024 SU3 Security Update 1 or 2022 SU8 Security Update 2, which address this vulnerability. 2) Implement strict file upload controls and validation on any custom or integrated systems that interact with Ivanti Endpoint Manager to prevent unauthorized file types. 3) Enhance user awareness training focusing on phishing and social engineering tactics to reduce the likelihood of user interaction enabling exploitation. 4) Employ network segmentation and least privilege principles to limit the potential impact of a compromised endpoint manager server. 5) Monitor logs and network traffic for unusual file upload activity or execution patterns that could indicate exploitation attempts. 6) Consider deploying application whitelisting and endpoint detection and response (EDR) solutions to detect and block malicious payloads. 7) Regularly review and update incident response plans to include scenarios involving endpoint management system compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-29T23:03:23.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0456a12a58f153632f082

Added to database: 9/9/2025, 3:19:06 PM

Last enriched: 9/9/2025, 3:19:40 PM

Last updated: 9/10/2025, 4:07:20 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats